Development of a device for protection against unauthorized access based on three-factor identification and user authentication

A device to provide protection against unauthorized access to information based on the use of three-factor identification and user authentication with the ability to differentiate access to the information environment containing confidential information has been developed. Differentiation of access...

Повний опис

Збережено в:
Бібліографічні деталі
Дата:2021
Автори: Азарова, А. О., Біліченко, Н. О., Катаєв, В. С., Павловський, П. В.
Формат: Стаття
Мова:Ukrainian
Опубліковано: Інститут проблем реєстрації інформації НАН України 2021
Теми:
Онлайн доступ:http://drsp.ipri.kiev.ua/article/view/239250
Теги: Додати тег
Немає тегів, Будьте першим, хто поставить тег для цього запису!
Назва журналу:Data Recording, Storage & Processing

Репозитарії

Data Recording, Storage & Processing
Опис
Резюме:A device to provide protection against unauthorized access to information based on the use of three-factor identification and user authentication with the ability to differentiate access to the information environment containing confidential information has been developed. Differentiation of access rights involves the division of users into three separate groups, members of these groups have different levels of access to information resources of the system, granting of access for each level is implemented by a combination of several authentication methods: for the level 3 it is a scan of the QR code, for the level 2, this is a QR ID scan and a fingerprint scan, for the level 1 it is a scan of the user ID, confirmation by biometric features, and also request of the unique password for access to system level. The device also allows detecting attempts of unauthorized access in advance, providing access to information resources to authorized users, even in case of failure of the device and in case of emergencies. It has increased durability and resistance to physical breakage, improves the system of information protection at different business entities, being more informative and easy for the user, it does not require special knowledge in the field of technical protection of information. It allows detect unauthorized access attempts, to restore basic functions of the device in emergency situations The developed device was modeled in a software environment for computer-aided design, which confirmed its functionality and ability to perform the stated tasks. Possibility of a modular design of the device allows simplify and reduce production costs and relative versatility and the flexibility of the software provides a wide range of possibilities for application in real objects of information activity. Fig.: 2. Refs: 11 titles.